ZXCoders Blog - attackshttp://blog.zxcoders.com/?q=taxonomy/term/41
enSecurity of information systemshttp://blog.zxcoders.com/?q=node/23
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><html>
<head>
</head>
<body >
<p>
Security is a key aspect of any information system. The question is not "Will I suffer an attack?" but "<b>When</b> will I suffer an attack?", this means that there is no information system that does not need security measures.
</p>
<p>
There are a number of fundamental security properties that any system must take into consideration in order to protect information and users privacy. These properties can be summarized as follows:
<ul>
<li>Confidentiality - not allow access to information by unauthorized parties</li>
<li>Integrity - ensure that information is not changed</li>
<li>Authentication - possibility to identify who is accessing the system in a way to authorize, or not, the access.</li>
<li>Non-repudiation - ensure that whoever performs certain action can not deny responsibility for such action.</li>
</ul>
</p>
<p>
In order to ensure confidentiality, cypher or encryption algorithms are used. In the case of integrity are the functions of hashing or application of HMAC algorithms (Keyed-Hash Message Authentication Code). Authentication can be performed, for example through digital certificates, biometrics techniques, etc. For non-repudiation digital signature mechanisms are applied.
</p>
<p>
Regarding attacks on the security of an information system, the most frequent are attacks by listening, spoofing, denial of service, phishing and hijacking.
</p>
<p>
In future posts, I will deepen all the points mentioned here, since security is a very important issue that concerns not only system administrators but also users.
</p>
<p>________<br>ZXCoders</p>
<div align="center">
<script async src="//pagead2.googlesyndication.com/pagead/js/adsbygoogle.js"></script>
<!-- Posts no blogue -->
<ins class="adsbygoogle"
style="display:inline-block;width:728px;height:90px"
data-ad-client="ca-pub-7608128644099125"
data-ad-slot="7088055578"></ins>
<script>
(adsbygoogle = window.adsbygoogle || []).push({});
</script></div>
</body>
</html></div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix"><h3 class="field-label">Tags: </h3><ul class="links"><li class="taxonomy-term-reference-0" rel="dc:subject"><a href="/?q=taxonomy/term/39" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Security</a></li><li class="taxonomy-term-reference-1" rel="dc:subject"><a href="/?q=taxonomy/term/40" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">systems</a></li><li class="taxonomy-term-reference-2" rel="dc:subject"><a href="/?q=taxonomy/term/41" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">attacks</a></li></ul></div>Mon, 30 Oct 2017 00:05:55 +0000Marco23 at http://blog.zxcoders.comhttp://blog.zxcoders.com/?q=node/23#comments